Social Engineering
Phishing
Physical Security
Data Protection
Ransomware
100

Social engineering is not about hacking software, it's about hacking …

What are humans?

100

If you suspect an email is phishing don't __________.

What is click link?

100

How many questions must you answer before resetting your forgotten Trend password?

What is at least 2?

100

A security practice and a feature used to prevent unauthorized access to a computer or mobile device when left unattended. It’s normally set in GPO to activate when there is no activity in the computer?

What is the Lock Screen?

100

Malware that prevents users from accessing their system or files until money is paid?

What is Ransomware?

200

Someone trying to hack you is more likely to pose as your ______ than your direct report?

What is a boss? 

200

An unusual ______ is a possible sign the email is phishing?

What is the sender?

200

Crossing a door without a badge by walking close to the victim without his knowledge?

What is tailgating?

200

TrendMicro information that has economic value to the Company is classified as?

What is Top Secret?

200

Ransomware family based on encrypting files until users pay the ransom in exchange for the decrypt key?

What is Crypto-ransomware?

300

Social engineering is usually trying to extract from you _______ information?

What is sensitive? 

300

Do it now! A sense of ______ is a typical tactic in phishing?

What is urgency?

300

Crossing a door without a badge by walking close to the victim, WITH his knowledge?

What is piggybacking?

300

This is any data that could potentially identify a specific individual?

What is Personally Identifiable Information (PII)?

300

This Trend Micro tool can decrypt files locked by certain crypto-ransomware variants without paying the ransom?

What is Trend Micro Crypto-ransomware File Decryptor?

400

Because I say so!  Faking _______ is a typical tactic in social engineering?

What is an authority?

400

Instagram ___ can also contain phishing links?

What is DMs?

400

Only 5 coupons left!! Perceived _____ creates demand and promotes action. Beware.

What is scarcity?

400

This computed value ensures a user the file they downloaded has not been modified?

What is Hash?

400

The numbers-only name of a backup strategy where a user will create 3 backup copies on 2 different media with 1 backup in a separate location?

What is 3-2-1 Rule?

500

A fake site that looks official and just waits, expecting users to find it through engines is known as a...

What is a watering hole?

500

If you need to forward a spear phish email to infosec use this address?

What is 911@trendmicro.com?

500

USB _____ involves passing out free USB sticks with malware, or "forgetting them" in public places?

What is baiting?

500

This is the process of decreasing or eliminating a remnant magnetic field. Use to destroy data on magnetic storage?

What is Degaussing?

500

The WannaCry ransomware was released by this hacker group?

What is The Shadow Brokers?